簡易檢索 / 詳目顯示

研究生: 陳威志
Wei-chih Chen
論文名稱: 利用計數器與堆疊研究無線射頻辨識之反碰撞演算法
Enhanced Anti-collision Algorithm For RFID Based on Counter and Stack
指導教授: 洪西進
Shi-Jinn Horng
口試委員: 林勤經
Chin-jing Lin
林基成
Ji-cheng Lin
鍾國亮
Kuo-liang Chung
張瑞峰
NONE
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 57
中文關鍵詞: RFIDAnti-collsion Algorithm
外文關鍵詞: 無線射頻辨識, 反碰撞演算法
相關次數: 點閱:167下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現代社會中,任何一個商用產品具有省電、省錢和高效率就顯得非常重要。RFID的發展歷史已有數十年之久,而且最近這幾年越來越受到許多研究者的青睞、應用範圍也越來越廣如物流業者、醫療、農業、畜牧業…等。RFID主要的架構包含讀取器以及標籤;讀取器以及所有的標籤共享同一無線的頻道。在傳輸資料時,產生了許多資料碰撞的問題,因此標籤反碰撞機制也顯得格外的重要。本篇論文將提出兩套創新的標籤反碰撞演算法,其名稱分別為EAA (Enhanced Anti-collision Algorithm)以及NEAA(New Enhanced Anti-collision Algorithm Based on Counter and Stack)。EAA演算法是基於ABS演算法所提出的另一套演算法。我們將ABS演算法進行大幅度的修改,並且保有ABS演算法既有的優點。EAA演算法利用堆疊、曼徹斯特編碼、與暫存字串可以有效地降低碰撞的發生機率和減少讀取標籤的時間。
    NEAA是基於EAA所提出的演算法,NEAA同樣利用堆疊、曼徹斯特編碼、與暫存字串使得碰撞變的具有意義。由於標籤的識別碼為二元數值且具唯一性,NEAA利用此特性使得讀取器在一個timeslot內可以讀取多個標籤。在一般的環境下NEAA的效能趨近於EAA。但是,在非常大量的標籤環境下NEAA將產生更少的碰撞、消耗更少的讀取時間。


    For the modern society, it becomes very important to reduce the power consumption, cost and promote efficiency for any commercial products. RFID (Radio Frequency Identification) has been developed for many years and it got much attention from researchers recently as there are lots of applications such as medical, stock, farming, animal husbandry and etc. being used practically in the real world. Owing to the shared wireless channel between tags and reader during communication, the tag collision arbitration is a significant issue for reducing the communication overhead. This thesis presents two novel anti-collision algorithms; one is named as EAA (Enhanced Anti-collision Algorithm) which is based on ABS (Adaptive Binary Splitting) algorithm, the other is named as NEAA (New Enhanced Anti-collision Algorithm Based on Counter and Stack). EAA improves the ABS algorithm, and inherits the advantages of the ABS algorithm. EAA uses counter, stack, and Manchester code to reduce the probability of collision efficiently. Compared to the methods proposed by other researchers, the performance evaluation shows that the proposed EAA uses fewer timeslots for indentifying tags.
    NEAA is based on EAA. NEAA uses counter, stack, and Manchester code to make collision become significant. Since the ID (identification) of a tag is a unique binary number, NEAA uses this characteristic to identify lots of tags in a timeslot. In general case, the performance of NEAA approximates to that of EAA. NEAA will cause fewer collisions, and consume fewer timeslots for identifying tags, if the amount of tags is very large.

    摘要......................................................i Abstract................................................iii 目錄.....................................................iv 圖目錄....................................................v 1. Introduction...........................................1 2. Exiting anti-algorithms based on binary tree in RFID...4 3. Manchester code.......................................11 4. Enhanced Anti-collision Algorithm.....................12 4.1 The principle of Enhanced Anti-collision Algorithm...12 4.2 Analysis of EAA......................................21 5. New Enhanced anti-collision algorithm.................26 5.1 The principle of NEAA................................26 6. Experiment............................................35 7. Conclusions...........................................48 Reference................................................49

    [1].Bo Feng, Jin-Tao Li, Jun-Bo Guo, and Zhen-Hua Ding, “ID-binary tree stack anticollision algorithm for RFID,” Proc. Computers and Communications, ISCC '06, Page(s): 207 -212, June 2006.
    [2].Bo Chen ”Design of FPGA to radio frequency identification system based on international standard ISO/IEC18000-6 and its practice,” Chinese Journal of Electron Devices, Vol. 28 No. 4, Page(s): 921-924, Dec. 2005.
    [3].“EPCTM radio-frequency identification protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz Version 1.0.9,” EPCglobal, Dec. 2005.
    [4].“Information technology automatic identification and data capture techniques- radio frequency identification for item management air interface- part 6: parameters for air interface communications at 860-960 MHz” ISO/IEC FDIS 18000-6, Nov. 2003.
    [5].F. Zhou, C. Chen, D. Jin, C. Huang, and H. Min, ”Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems,” Proc. Int. Symp. Low Power Electronics and Design, Page(s): 357-362, 2004.
    [6].Ji Hwan Choi, Dongwook Lee, and Hyuckjae Lee, “Query tree-based reservation for efficient RFID tag anti-collision,” IEEE Commun. Lett, Vol. 11, No. 1, Page(s): 85-87, Jan. 2007.
    [7].J. I. Capetanakis,“Tree algorithms for packet broadcast channels,”IEEE Trans. Inform. Theory, Vol. 25, Page(s): 505-515, Sept. 1979.
    [8].Jihoon Myung, Wonjun Lee, Jaideep Srivastava, “Adaptive binary splitting for efficient RFID tag anti-collision,” Communications Letters, IEEE, Vol. 10, Issue 3, Page(s):144-146, Mar. 2006.
    [9].Jihoon Myung, Wonjun Lee, Jaideep Srivastava, and Timothy K. Shih, “Tag-splitting: adaptive collision arbitration protocols for RFID tag identification, ” to appear in IEEE Transactions on Parallel and Distributed Systems, 2007.
    [10].Y. Kawakita, J. Mitsug, ” Anti-collision performance of Gen2 air protocol in random error communication link, ” Proc. Applications and the Internet Workshops, Page(s): 68-71, Jan. 2006.
    [11].K. Finkenzeller “RFID handbook: radio-frequency identification fundamentals and applications,” John Wiley and Sons Ltd, second edition, 2003.
    [12].Leian. Liu, Zhenhua Xie, and Jingtian Xi, “An improved anti-collision algorithm in RFID system,” Proc. Mobile Technology, Applications and Systems, 2005 2nd International Conference, Page(s): 67-71, Nov. 2005.
    [13].J. Myung, W. Lee, T. K. Shih, “An adaptive memoryless protocol for RFID tag collision arbitration,” Multimedia, IEEE Transactions on Vol. 8, Issue 5, Page(s): 1096-1101, Oct. 2006.
    [14].Rob Glidden, John Schroeter, ”Bringing long-range UHF RFID tags into mainstream supply chain applications,” Sensing & Security, Page(s): 24-36, July 2005.
    [15].T. Wang, “Enhanced binary search with cut-through operation for anticollision in RFID systems,” IEEE Commun. Lett., Vol. 10, No. 4, Page(s): 236-238, Apr. 2006.
    [16].刁建成, “RFID原理與應用,” 全華科技圖書.
    [17].日經BP RFID技術編輯部, ”RFID技術與應用,” 日經BP社.

    QR CODE